Guest Blogs

Resilience Through Collaboration

By Jeremy Nichols, Director, Global Threat Intelligence Center, NTT Security Holdings At NTT, we are united in our passion about contributing to a safer society and digital future. As such, we believe that collaboration and sharing are crucial elements in the fight against cyber threats and the development of cyber threat…

Guest Blogs

International Women’s Day: Paths to Empowerment

By Jaya Baloo, Chief Security Officer, Rapid7 On International Women’s Day, we cast a global spotlight on the vital, yet often overlooked, labor of women throughout the world. Women work incredibly hard and carry out tasks essential for the survival and prosperity of their communities. They gather firewood, fetch…

Guest Blogs

CTA and Virus Bulletin: Community in Action

By Kathi Whitbey, Business Operations Manager, Unit 42, Palo Alto Networks What’s your favorite time of year? Virus Bulletin (VB) time is mine! The VB Conference is held annually in the fall, in beautiful locations, and it brings together some of the brightest and technically savvy people in…

Guest Blogs

Fostering Community Defense: Together We Can Go Further

By Sergio De Los Santos, Head of Innovation and Labs at Telefonica Tech Despite the overwhelming challenges we still face in the world of cyber security, we have come a very long way since the early days of cyber security. Starting from those challenging early days at the turn of…

Guest Blogs

SecureBrain: Aligning with the CTA

By Moto Yamamura, COO, SecureBrain In February 2019, SecureBrain formalized our membership and joined forces with Cyber Threat Alliance with the intent to sharing cyber threat intelligence with top security vendors around the world. When it comes to cybersecurity, knowledge about up-and-coming cybersecurity threats is crucial. We at SecureBrain…

Guest Blogs

CTA: Revolutionizing Global Cybersecurity Through Unparalleled Collaboration

By SCILabs, Scitum-Telmex In the increasingly interconnected digital landscape, sharing threat intelligence among organizations has become vital for maintaining robust cybersecurity strategies. Despite its importance, the process grapples with numerous challenges. These include establishing trust and confidentiality, ensuring data standardization, maintaining the quality and relevance of information, managing the high…

Guest Blogs

Machine Learning NOT Marketing Lingo

By Rathna Kalidas, Senior Product Manager, K7 Computing ChatGPT and Bard have brought renewed interest in the much-marketed, ubiquitous, term AI/ML. If marketing claims are to be believed, anything that is powered by AI/ML is significantly better than that which is not; further, anything that does not bear the…

Guest Blogs

Encourage, Educate & Engage: Thinking OUTside the Box to Draw Women IN

By Kathi Whitbey, Business Operations Manager, Unit 42, Palo Alto Networks As we approach International Women’s Day on March 8, 2023, there is always talk about the lack of women in cybersecurity. How do we “fix” this problem, when women make up about 50% of the world population – but…

Guest Blogs

Collaboration is Key to Better Threat Intelligence

By Victor Acin (Blueliv Labs Manager) Where do you get your cybersecurity news from? If you are a cybersecurity vendor, your news feed is a great way to find outdated threat information, after an attack has already happened. But, if your mission is to defend the digital ecosystem, critical…

Guest Blogs

Happy 6th Birthday, Cyber Threat Alliance!

By Derek Manky, Chief Security Strategist & VP Global Threat Intelligence, Fortinet Inception It has been six whole years since the official launch of the CTA, and two more in practice as the dream was built. And what a fantastic journey it has been over the racing course of time.